OSINT Featured Using Newly Surfaced Data Breaches for OSINT Research Data Breach Search Engines (DBSEs) collect and organize leaked information from data breaches, enabling OSINT investigators to access it.
OSINT Political Donations - OSINT Explore tools like FEC, Open Secrets, and state databases to research individual political donations and donor details easily.
OSINT Ethereum Reboots Crypto Investigation The smart blockchain created a crypto ecosystem of NFTs, DeFi, and Dapps, along with new kinds of investigations.
OSINT How I Research a Bitcoin Wallet's Past: OSINT for Cryptocurrency Investigation Part 2 Explore the intricate world of Bitcoin address research using Blockchair and Oxt.me. Learn to uncover transaction details and patterns for deeper insights into crypto activity.
OSINT The UK OSINT Community: Working To Boost Sovereign Intelligence Capabilities British OSINT practitioners are flocking to join the new UK OSINT Community in support of their mission to bolster sovereign intelligence capabilities.
OSINT Featured The Basics of OSINT for Cryptocurrency Investigation: Part 1 New to cryptocurrencies? Learn to investigate addresses step-by-step, from blockchain explorers to scam databases in our beginner's guide.
OSINT Pastebin and Its Incidental OSINT Despite being a great OSINT tool, Pastebin remains misunderstood and underutilized.
human trafficking Featured Navigating the Cryptic Nature of Currency in Human Trafficking "Follow the money." We have all heard it at some point, especially if you are in the anti-human trafficking space. Yet, if only it was THAT simple. Let's pull this apart.
OSINT Download Websites to Find OSINT Websites are full of useful information that is hidden in source code or small print in obscure subdomain. The following is an excerpt from the book, The OSINT Guide, by Thomas Caliendo. Here we will walk through how to discover Open Source Intelligence (OSINT) by downloading a website to search
OSINT Featured Hunting the Hunters: Tracing Human Traffickers Take a deep dive into how cybercriminals fuel human trafficking on the internet. Discover the promising role of OSINT in unmasking these elusive criminals.
OSINT Featured Using OSINT to Combat Organ Trafficking Unravel the dark web of organ trafficking and discover the power of open-source intelligence (OSINT) in exposing this clandestine crime and advocating for global health justice.
OSINT Featured Leveraging Breach Data for OSINT Unearth the secrets of leveraging data breaches for OSINT investigations in this comprehensive cybersecurity article, packed with insights on real-world implications and essential strategies for staying vigilant in the constantly shifting digital landscape.
OSINT Featured OSINT and TikTok: Striking a Balance between Intelligence Gathering and Privacy Protection The US government has been pressing down hard on the Chinese-owned social media company TikTok, raising many questions over intelligence gathering and privacy protection.
OSINT Featured The Dark Side of OSINT: Risks and Challenges of Misuse Some individuals have been at the battlefront, releasing the most explicit details about the war through social media, except that they aren't at the battlefront but are OSINT amateurs flexing their espionage skills.
OSINT TikTok Targeted OSINT Investigations (P1 - User) You get a new case to investigate and it's a young social media user with no Facebook, no Twitter, just TikTok.
OSINT Mastodon OSINT: A Comprehensive Introduction Part one in our series on Mastodon, focused on gathering OSINT from the platform's users, instances and network.
OSINT OSINT: The Mastodon Paedophile Problem Mastodon has a major paedophile problem, join computer scientist Edward Charles for a closer look at the pedophilic side of the fediverse.
OSINT OSINT: Query Your Target System Like A Database You've run queries on data collection for a long time, but what if your system can also be queried in this way?
OSINT How OSINT Is Used In SIM Swap Scams Learn how scammers leverage OSINT when running SIM swap scams, and some of their common techniques.
OSINT A Closer Look At Russian Military Railway Infrastructure Russia has one of the biggest railway systems in the world which is hugely important to the Russian Military.
OSINT The Value Of The Intelligence Cycle To Information Security Researchers Learn about the intelligence cycle through practical examples, and how it can be applied to OSINT investigations
OSINT OSINT Bites 1 - Architecture Part 1 of our OSINT Bites Collection focuses on architecture and the role it plays in geolocation.
INFOSEC Against Child Pornography Child pornography awareness is crucial to society and hardly spoken about. Alesanco stands against child exploitation and shares important methods on how we can protect children from the dangerous threats of real life monsters.
OSINT Conflict of Interest: How to Research Corporate Lobbying & Lobbyists A lot of the activity between corporations and politicians is publicly documented but it remains hidden because so few people know where to look.
OSINT Top 6 Personality Traits for Successful Investigators Anyone who works in the field of investigations for long enough learns to develop certain character traits and cognitive characteristics.